News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Zero-trust remote access solution for secure hybrid working
Zero-trust remote access solution for secure hybrid working - image by Franz Bachinger on Pixabay

The new LANCOM Trusted Access Client enables secure and scalable network access for employees in the office, at home or on the go, thereby protecting modern hybrid working from anywhere and at any time. Through complete integration into the LANCOM Management Cloud, commissioning and configuration are “zero-touch” for easy and quick rollout of new remote access connections. The LANCOM Trusted Access solution dynamically adapts to increasing security requirements. Zero trust from SMEs to enterprises LANCOM Trusted Access supports both classic full network access as a VPN client as well as the migration to a zero trust security architecture with...

Read more

More security with MDR – Cybersecurity as a Service
More security with MDR – Cybersecurity as a Service - Image by Gerd Altmann on Pixabay

NDR – Network Detection & Response is now considered a security technology in IT security that should not be missing from any company network. But who evaluates all the data and leads the response? The magic word here is MDR – Managed Detection and Response Services. An interview with Michael Veit, security expert at Sophos. Effective security solutions include technological components such as networked endpoint protection, a next generation firewall, both paired with artificial intelligence and human expertise in the form of security services. While classic security solutions can detect and ward off a large number of attacks and malicious anomalies, it has long...

Read more

Report 2023: Ransomware dominance
Report 2023: Ransomware dominance

The increase in ransomware, COTS malware, and attacks on cloud providers brings new challenges for cybersecurity teams. The Elastic Global Threat Report 2023 clearly shows the dominance of ransomware among all malware. The Elastic Security Labs Global Threat Report is based on analysis of over 1 billion data points from the last twelve months. It shows that ransomware is still on the rise and becoming increasingly diversified: More than half of all malware infections observed took place on Linux systems and credential access procedures for intrusions into cloud systems are now standard. In summary the…

Read more

Strengthening cyber resilience – tips for CISOs
Strengthen cyber resilience - tips for CISOs

As digitalization grows, cyber threats also grow. Chief information security officers (CISOs) must regularly adapt their strategies. AI-driven threat defense is a strategy. As the digital landscape expands, so do the dimensions of the risks. Traditional cybersecurity concepts that once sufficed have been made obsolete by the relentless and ever-evolving nature of cyber threats. Therefore, the CISO's strategy must adapt and transform from a static set of rules into a flexible manual. From redesigning prevention strategies to strengthening defense measures to promoting resilience as a central part of...

Read more

Number of cyber attacks higher than ever
Number of cyber attacks higher than ever

Cyber ​​attacks on companies are increasing rapidly worldwide and reached a new high in the first half of 2023. Most attacks are aimed at the USA, but Germany is already in third place. An analysis by Forescout. In their latest report, experts from Forescout Vedere Labs analyzed the activities of cybercriminals and state-backed hackers in the first six months of 3. The results show an alarming increase in attacks on companies and organizations worldwide. 2023 percent more security gaps compared to 15 A total of over 2022...

Read more

Malware scripts indelibly hidden in blockchain
Malware scripts indelibly hidden in blockchain

Attackers first hid malware and malicious scripts as a data source on Cloudflare. When Cloudflare reacted and wanted to delete the data, the attackers came up with a new idea: they hid them disguised as cryptocurrency transactions (smart contract) in the immutable Binance Smart Chain (BSC) blockchain. With the so-called ClearFake, website visitors receive a message that their browser is out of date and needs to be updated. If the visitor clicks on the link, malware files are automatically reloaded from a compromised Cloudflare worker host. So much for the known chain of attacks. “EtherHiding” – undeletable malware in blockchain But as…

Read more

Passwordless fingerprint authentication via smart card

The new SafeNet IDPrime FIDO Bio Smart Card provides a simple, secure and fast way for users to access applications using only their fingerprint. This provides companies with a passwordless, phishing-resistant authentication solution. Thales' SafeNet IDPrime FIDO Bio Smart Card is a security key that enables strong multi-factor authentication (MFA) for businesses. This new contactless smart card allows users to quickly and securely access corporate devices, applications and cloud services by using a fingerprint instead of a password. Stolen logins responsible for every second attack According to the...

Read more

Data strategy: Don’t forget the archive
Data strategy: Don’t forget the archive

The archive is an important component in the data strategy and makes a decisive contribution to the long-term and compliant storage of data. Companies should archive their data for a variety of reasons. Companies today rely on agile and intelligent use of data. But data that is not required in daily business or that must be stored securely and unchangeably for legal reasons belongs in an archive. And since an archive that can be managed well in the long term and is legally compliant must meet certain basic requirements, a simple file share is not enough. Why archive? There are various reasons why companies...

Read more

Manage vulnerabilities and attack surfaces
Manage vulnerabilities and attack surfaces

Since the attack surface is constantly growing in all companies, exposure management and weak point and vulnerability management are becoming increasingly important. The launch of ExposureAI adds new generative AI capabilities and services to the Tenable One exposure management platform. At the same time, the company is introducing “Tenable Exposure Graph,” a Snowflake-based data lake that feeds the ExposureAI engine. This unified data platform, encompassing more than a trillion unique exposures, IT assets and security findings (vulnerabilities, misconfigurations and identities) across IT, public cloud and OT environments, is the world's largest repository of contextual exposure data and...

Read more

FBI takes action against IT freelancers from North Korea
FBI takes action against North Korean IT freelancers

FBI: North Korea sends many IT employees and developers to China and Russia to work for Western companies and use the money to finance the North Korean missile program. North Koreans also offer their services via freelance platforms, but use IP spoofing to disguise where they really come from. The FBI warns and takes action against registered domains and networks. Due to the shortage of skilled workers, many companies are increasingly relying on unknown IT freelancers who work remotely. As the FBI has discovered, American companies in particular often use IT freelancers from Russia, China and other Asian countries. Many people don't realize that they...

Read more